-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Pid,

On 9/2/2010 11:51 AM, Pid wrote:
>> On 9/2/2010 11:28 AM, Christopher Schultz wrote:
>>> 1. Use a password entered on the console during start-up (the "Apache
>>>     httpd strategy")
> 
> java.io.Console makes this easy in Java 6, but...

Right: before Java 6, you'd have to enter the password clear-text on the
console. :(

>>> All other strategies simply move the problem to some other component.
>>> Protecting one password requires another password which requires
>>> protecting which ... you get the idea.
> 
> ..lots of info is available by JMX, once the server is up.  In Java 6
> you can attach to the process locally, without having to configure the
> JMX ports because it injects the management agent into the virtual machine.

I hadn't considered that, never having used JMX. Are you saying that
anyone with local access can snoop a JVM? What are the strategies
available to prohibit that? Can you disable local JMX altogether? How
about some kind of authentication?

> Worse, if they're already on your server they've probably got a much
> bigger surface area to attack, than just Tomcat.  And if they get root,
> it's all over.

+1

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkx/0UQACgkQ9CaO5/Lv0PAtVgCaA0q97gYTRPrqB9FfiKCFhzPW
cFUAnRrKtuYAp7Ee5xTTDc66CEuU8AQM
=a7//
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to